International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 7 - Issue 1, January 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Security Of An Enterprise Level Rdbms - Threats And Challenges

[Full Text]



Ch Sajjad Ahmed, Saeed ur Rehman Malik



RDBMS, Database security, challenges, threats, attacks



All enterprises are managing their day to day affairs using IT based applications. In these applications, the most valuable asset is Data. A Relational Database Management System is utilized to retrieve and maintain the data in an efficient manner. (RDBMS)[1] was coined in Late-Seventies by E.F. Codd and since then all commercial and enterprise database are following RDBMS Model. Importance of data and its volume make RDBMS favorite targets for attackers. These attacks can result in compromise of a Database in many ways. In this paper the challenges and threats being faced by RDBMS are identified



[1] C.F Codd, “ A RELATIONAL MODEL OF DATA FOR LARGE SHARED DATA BANK”, Communication of ACM, Vol 13, No 6, 1970, Pages 377-87

[2] http://www.brighthub.com/computing/smb-security/articles/61400.aspx (20 Nov 2014)

[3] ErezShmueli, Ronen Vaisenberg, Yuval Elovici, ChananGlezer, “Database Encryption – AN OVERVIEW OF CONTEMPORARY CHALLENGES AND DESIGN CONSIDERATIONS”, SIGMOD Record, September 2009 (Vol. 38, No. 3).

[4] Emil Burtescu, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, Journal of Applied Quantitative Methods, Vol. 4, no. 4, Winter 2009.

[5] Mr. SaurabhKulkarni, Dr. SiddhalingUrolagin, “REVIEW OF ATTACKS ON DATABASES AND DATABASE SECURITY TECHNIQUES”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 11, November 2012

[6] Amichai Shulman, White Paper “TOP TEN DATABASE SECURITY THREATS”, ImpervaInc

[7] http://www.channelinsider.com/c/a/Security/Database-Vulnerabilities-Top-10-Rules-IT-Shops-Break-772412 (18 Nov 2014)

[8] Ravi S. Sandhu, SushilJajodia, “DATA AND DATABASE SECURITY AND CONTROLS”, Handbook of Information Security Management, Auerbach Publishers, 1993, pages 481-499.

[9] http://www.w3schools.com/sql/sql_injection.asp (18 Nov 2014)